SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

SECURE COMMUNICATION BASED ON AMBIENT AUDIO
ABSTRACT:

We propose to establish a secure communication channel among devices based on similar audio
patterns. Features from ambient audio are used to generate a shared cryptographic key between
devices without exchanging information about the ambient audio itself or the features utilized for
the key generation process. We explore a common audio-fingerprinting approach and account for
the noise in the derived fingerprints by employing error correcting codes. This fuzzycryptography scheme enables the adaptation of a specific value for the tolerated noise among
fingerprints based on environmental conditions by altering the parameters of the error correction
and the length of the audio samples utilized.

In this paper, we experimentally verify the feasibility of the protocol in four different realistic
settings and a laboratory experiment. The case studies include an office setting, a scenario where
an attacker is capable of reproducing parts of the audio context, a setting near a traffic loaded
road, and a crowded canteen environment. We apply statistical tests to show that the entropy of
fingerprints based on ambient audio is high. The proposed scheme constitutes a totally
unobtrusive but cryptographically strong security mechanism based on contextual information.

More Related Content

PDF
Al-Nesser Resume
PDF
Resume
PDF
Dsp projects
PDF
Work history
DOC
Single phase residual current breaker
PDF
Sink trail a proactive data reporting protocol for wireless sensor networks
PDF
Cv caro 2013
PDF
Distributed web systems performance forecasting using turning bands method
Al-Nesser Resume
Resume
Dsp projects
Work history
Single phase residual current breaker
Sink trail a proactive data reporting protocol for wireless sensor networks
Cv caro 2013
Distributed web systems performance forecasting using turning bands method

Similar to Secure communication based on ambient audio (20)

PDF
Secure communication based on ambient audio
PDF
Java secure communication based on ambient audio
PDF
IEEE Information forensic and security Title and Abstract 2016
PPTX
logo ppt.pptx
PDF
Dotnet a data fusion technique for wireless ranging performance improvement
PDF
A data fusion technique for wireless ranging performance improvement
PDF
A data fusion technique for wireless ranging performance improvement
PDF
Dotnet a data fusion technique for wireless ranging performance improvement
PDF
A data fusion technique for wireless ranging performance improvement
PDF
A data fusion technique for wireless ranging performance improvement
PDF
A data fusion technique for wireless ranging performance improvement
PDF
Autotuned voice cloning enabling multilingualism
PDF
Enhanced security in lossless audio encryption using zigzag scrambling, DNA c...
PDF
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
PDF
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
PDF
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
PDF
Survey on Different Methods of Digital Audio Watermarking
PDF
Delay optimal broadcast for multihop wireless networks using self-interferenc...
PDF
Delay optimal broadcast for multihop wireless networks using self-interferenc...
PDF
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Secure communication based on ambient audio
Java secure communication based on ambient audio
IEEE Information forensic and security Title and Abstract 2016
logo ppt.pptx
Dotnet a data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
Dotnet a data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
Autotuned voice cloning enabling multilingualism
Enhanced security in lossless audio encryption using zigzag scrambling, DNA c...
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
Survey on Different Methods of Digital Audio Watermarking
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Ad

More from Ecwayt (20)

PDF
Covering points of interest with mobile sensors
PDF
Coloring based inter-wban scheduling for mobile wireless body area networks
DOC
Code modulation based encryption & decryption technique for secure communicat...
PDF
Clustering sentence level text using a novel fuzzy relational clustering algo...
PDF
Clustering large probabilistic graphs
PDF
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
PDF
Cloudsim ranking on data manifold with sink points
PDF
Cloudsim quality-differentiated video multicast in multirate wireless networks
PDF
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
PDF
Cloudsim distributed web systems performance forecasting using turning bands...
PDF
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
DOCX
Civil 2013 titles
DOC
Chopper based dc motor speed control
PDF
Channel assignment for throughput optimization in multichannel multiradio wir...
PDF
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
PDF
Casual stereoscopic photo authoring
DOCX
Casual stereoscopic photo authoring
PDF
Capacity of hybrid wireless mesh networks with random a ps
DOC
Bomb detection robot with wireless camera
DOC
Bed side patients monitoring system with emergency alert
Covering points of interest with mobile sensors
Coloring based inter-wban scheduling for mobile wireless body area networks
Code modulation based encryption & decryption technique for secure communicat...
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering large probabilistic graphs
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim ranking on data manifold with sink points
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Civil 2013 titles
Chopper based dc motor speed control
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Casual stereoscopic photo authoring
Casual stereoscopic photo authoring
Capacity of hybrid wireless mesh networks with random a ps
Bomb detection robot with wireless camera
Bed side patients monitoring system with emergency alert
Ad

Secure communication based on ambient audio

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com SECURE COMMUNICATION BASED ON AMBIENT AUDIO ABSTRACT: We propose to establish a secure communication channel among devices based on similar audio patterns. Features from ambient audio are used to generate a shared cryptographic key between devices without exchanging information about the ambient audio itself or the features utilized for the key generation process. We explore a common audio-fingerprinting approach and account for the noise in the derived fingerprints by employing error correcting codes. This fuzzycryptography scheme enables the adaptation of a specific value for the tolerated noise among fingerprints based on environmental conditions by altering the parameters of the error correction and the length of the audio samples utilized. In this paper, we experimentally verify the feasibility of the protocol in four different realistic settings and a laboratory experiment. The case studies include an office setting, a scenario where an attacker is capable of reproducing parts of the audio context, a setting near a traffic loaded road, and a crowded canteen environment. We apply statistical tests to show that the entropy of fingerprints based on ambient audio is high. The proposed scheme constitutes a totally unobtrusive but cryptographically strong security mechanism based on contextual information.